(191.52 KB 1536x885 BITCOIN.jpg)
What is the best alternative to laundering the Bitcoin I have illegally earned? Anonymous 09/18/2022 (Sun) 23:34 [Preview] No. 15132 [Reply] [Last 50 Posts]
Is there another way to turn my "dirty" Bitcoin into clean money without having to buy monero?

I'm talking about an 8 digit amount, any suggestions
4 posts omitted.

Method 4 Anonymous 09/25/2022 (Sun) 06:40 [Preview] No.15139 del
Method 4 El_Dragón 2022-09-25 05:52:09 No.3055

4.1 - Search for the term "Best Bitcoin Mixers" on DuckDuckGo.

4.2 - Send your contaminated Bitcoins to the mixer and receive clean Bitcoins at your new Bitcoin address.

4.3 - Sell clean Bitcoins on any crypto exchange with KYC (Kraken) or without KYC (Bisq), receive the money in your bank account.

#Question: What is the difficulty level?

##Answer: Easier than watching football on TV.

Message too long. Click here to view full text.

Method 5 Anonymous 09/25/2022 (Sun) 06:42 [Preview] No.15140 del

5.1 - Search for the term "The World's Largest P2P Offshore Marketplace" on DuckDuckGo.

5.2 - Go to the "Anonymous ATM Cards" category and open a trade order using a disposable email, only trade with diamond level or platinum level sellers.

5.3 - Enter the address of a packet forwarding service to receive the order and place the tainted Bitcoins in the platform's 3-of-3 multisig escrow.

5.4 - After receiving the order, activate online banking access with a pseudonym and burner phone number following the seller's instructions.

5.5 - Go online banking and customize your daily ATM withdrawal limits, then use your anonymous ATM cards to withdraw cash from any ATM around the world.

Message too long. Click here to view full text.

Method 6 Anonymous 09/25/2022 (Sun) 06:42 [Preview] No.15141 del

6.1 - Search for the term "Offshore Company Formation" on DuckDuckGo.

6.2 - Register your offshore company away from your country's government's area of influence and obtain a corporate bank account in any tax haven other than the one where your offshore company was registered.

6.3 - Search for the terms "AgoraDesk" or "Hodl Hodl" on DuckDuckGo.

6.4 - Create an account using a secure email and sell your tainted Bitcoins by choosing the Bank wire option.

#Question: What is the difficulty level?

Message too long. Click here to view full text.

Method 7 Anonymous 09/25/2022 (Sun) 06:43 [Preview] No.15142 del

7.1 - Search for the term "Homeless Shelters Near Me" on DuckDuckGo.

7.2 - Offer money or drugs to a homeless person to use your documents and open a bank account under your control.

7.3 - Search for the terms "AgoraDesk" or "Hodl Hodl" on DuckDuckGo.

7.4 - Create an account using a secure email and sell your tainted Bitcoins by choosing the Bank wire option.

#Question: What is the difficulty level?

Message too long. Click here to view full text.

Anonymous 09/25/2022 (Sun) 06:44 [Preview] No.15143 del
I created this profile especially to post this wilderness survival guide, I hope it helps you and all sellers to achieve peace of mind like I did!

I continue to sell drugs with my seller profile here and in other darknet markets, but the cops never knocked on my door again.

My children will inherit clean money to secure the future, come what may.

Society judges us daily but it was the circumstances of life that led us to this path, everyone is born good.

Copy these 7 methods in a safe place, teach your friends and help strengthen darknet markets!

Take it easy and study all the methods well so you don't make the mistakes I made in the past!

Message too long. Click here to view full text.

(344.41 KB 1891x1648 gM79GyK.png)
So whonix + fully configured tor, what's the next levels to even higher security, /tech/?

Anonymous 08/25/2022 (Thu) 00:40 [Preview] No.15113 del
I accidentally uploaded two images for my post.

Anonymous 08/28/2022 (Sun) 14:07 [Preview] No.15117 del
>what's the next levels to even higher security, /tech/?
Using hardware without hardware backdoors (like intel's ME)

Anonymous 08/30/2022 (Tue) 23:30 [Preview] No.15118 del
Librebooted Thinkpad with camera, microphone and wireless physically removed (WiFi adapter plugged in whenever necessary), hardened gentoo install with optimized kernel + Whonix with configured LibreWolf (for superior fingerprint and no Mozilla Telemetry) over a private VPN which is a Raspberry pi hidden on public WiFi.

Anonymous 09/12/2022 (Mon) 16:50 [Preview] No.15127 del
run your own tor relay

Anonymous 09/23/2022 (Fri) 02:30 [Preview] No.15134 del
What're the benefits of running your own Tor relay?

pci_disable_device unknown parameter error Anonymous 09/04/2022 (Sun) 09:15 [Preview] No. 15123 [Reply] [Last 50 Posts]
The pci_disable_device function is defined in the source file of the kernel pci module.

Let the pci_disable_device function be a working parameter of the kernel pci module.

GRUB boot commands works when I type pci=disable_acs_redir=pci:12D8:2308 in linux pci module.

When I type pci=pci_disable_device=pci:12D8:2308 to disable the hardware, it gives unknown parameter error.

what is the reason of this ?

Anonymous 09/08/2022 (Thu) 19:29 [Preview] No.15124 del

Fart Anonymous 09/21/2022 (Wed) 17:07 [Preview] No.15133 del

(775.48 KB 750x742 1663306845742105.png)
Alternative to Tornado Cash Anonymous 09/18/2022 (Sun) 18:22 [Preview] No. 15131 [Reply] [Last 50 Posts]
Thought I would spread the word about a new privacy wallet that is integrated into Railgun. It's called Railway. It uses zk-snark proofs and works across any EVM capable chain. Imagine MetaMask, but if it had the ability to send 100% private transactions. That's what Railway is. Any ERC-20 or ERC-721 token can be transacted with with 100% anonymity.

(2.67 MB 1682x1682 master.png)
Corechan is mostly about technology. There's an off-topic board too. Come and check it out.

Anonymous 09/18/2022 (Sun) 13:24 [Preview] No.15130 del

Anyone knows a working SIM swapping provider? Anonymous 09/18/2022 (Sun) 11:33 [Preview] No. 15129 [Reply] [Last 50 Posts]
I found simswap.su but it look scammy

Arch Anonymous 09/15/2022 (Thu) 15:44 [Preview] No. 15128 [Reply] [Last 50 Posts]
I use Arch btw.

(237.71 KB 427x427 Z6.png)
ea Hermit 09/13/2022 (Tue) 03:41 [Preview] No. 363 [Reply] [Last 50 Posts]

So uh Anonymous 08/25/2022 (Thu) 21:16 [Preview] No. 15114 [Reply] [Last 50 Posts]
Anyone wanna help me find a proxy site so I can use discord on my chromebook

Anonymous 09/02/2022 (Fri) 10:44 [Preview] No.15122 del
Why on earth would you want to use that proprietary malware?:

Anonymous 09/09/2022 (Fri) 15:06 [Preview] No.15125 del
Just use a VPN or Tor brah. Proxies are unreliable and extremely slow.

Windows Security Thread Endwall 02/24/2018 (Sat) 02:29 [Preview] No. 1147 [Reply] [Last 50 Posts]
WINDOWS NT Security Thread

It turns out that MS Windows NT has an 80% market share in the Desktop Operating Systems Market (whatever that is...) So in all likelihood, if you work a job anywhere, you will be forced to sit down and work on one of these machines running this well known gem of an operating system. You probably won't have administrator rights, but that's OK, we'll make do.

In reality there is no Windows security but in this thread we will try to make life a little bit better even if it is just for a placebo effect. Also Windows hackers come and show us how you hack us up real good, and help our poor unprivileged users gain administrator rights without a password, so that they can install Mahjong. Windows Advanced Firewall, Registry Editing, Browsers, etc. Post all the tips and tricks to make Windows NT better than ever.
5 posts and 1 image omitted.

Endwall 05/08/2020 (Fri) 22:28:39 [Preview] No.1532 del
Windows Defender Firewall

Go to the search tab and type firewall. Select windows defender firewall. Click on advanced settings. Block all incoming and outgoing traffic by default. Then wipe out all of the policies or click disable, better to click delete and remove them. Then add the policies that you need. Lock them down by application if need be. Play around with the detailed rules and use filters for programs, ports and ip addresses to get the desired effects for your network applications to work. Adding new programs magically changes your firewall settings, but go back and fix them after each new application install. Wipe out and delete all inbound rules. If you need to let inbound come in, then you should know enough about the application to configure it.
Block everything and only let out/in what you need to go out/in, specific programs, ports and ip addresses.

Endwall 05/08/2020 (Fri) 22:55:56 [Preview] No.1533 del
Windows Subsystem for Linux

Installation guide:


I installed Debian, seems to work well for some applications. I'll import endware and test some fo the tools out. If you install debian you can install a windowing server Xming or CygwinX



Then you can install programs that work in Xorg server and call them from the command line and they'll pop up in windows on the desktop.

Bear in mind all of this is for convenience while you work on Windows, you can also access Linux tools in the shell and some GUI programs as well. Alternatively try Cygwin and CygwinX:


Message too long. Click here to view full text.

Anonymous 05/09/2022 (Mon) 15:51:00 [Preview] No.1774 del
I know Google has been hacking and censoring my sons emails. They do not get forgiven for that. William Gates & his entire staff and bloodline are banned from Heaven.



Endwall 09/04/2022 (Sun) 00:41 [Preview] No.1814 del
Local Security Policy

There are firewall settings that don't change when new programs modify windows advanced firewall. These rules sit beneath and supersede the main windows advanced firewall rules.

Type here to search-> "Local Security Policy" -> Click Local Security Policy.

There is a folder Windows Defender Firewall, with the same layout. Put your rules in here and they won't change, and they override the other rules.

I have also found out that these rules can be scripted by the command netsh, so I might make something later on.

Endwall 09/04/2022 (Sun) 00:45 [Preview] No.1815 del
General Policy and Inbound rules:

Endwall 07/06/2019 (Sat) 04:37 [Preview] No. 1433 [Reply] [Last 50 Posts]
Want to say something off topic about anything?

Have a hot tip about something in the computer security world that doesn't fit into any current thread or category?

Want to chat with your fellow invisible 7 proxy friends?

Want to tell Lt. Gen Michael Hayden, Lt. Gen James Clapper,GEN Keith Alexander, ADM Michael Rogers, GEN Paul Nakasone, GOOGLE, AMAZON, FACEBOOK, Microsoft, Apple, etc. how you feel?

It's open mic at >>>/os/ , anything goes!!

Put all of your banter here:
Edited last time by Endwall on 10/26/2019 (Sat) 02:50.
42 posts and 4 images omitted.

Anonymous 08/17/2022 (Wed) 05:11 [Preview] No.1804 del
08/09/2022 (Tue) 17:57 No. 1795

The "hardware antivirus" Anonymous 08/17/2022 (Wed) 05:22 [Preview] No.1805 del
08/07/2022 (Sun) 07:06:36 No. 1794
Antivirus and cyber security systems used for computers are software-based.
Today, cyber espionage can be done not only with codes and programs, but also on hardware.
It is possible to spy directly on the hardware, bypassing the operating system and antivirus by loading harmful codes into the firmware on the chips of the hardware.
While it is possible to clean the malicious rootkits infecting the UEFI / BIOS firmware and Harddisk firmware of the computer by reinstalling the original firmware of the hardware manufacturer, the firmware of the chips in the other hardware of the computer (keyboard, mouse, mouse, usb controller, camera, microphone, video card, PCI slots and other hardware) It is not possible for ordinary people to detect and clean rootkits infected with the rootkit.
For this reason, a special operating system or special system software is required to detect rootkits that infect the firmware of chips in other hardware.
This system and operating system can detect by examining the signals given by other hardware to the system and by examining the operation of the firmware on the hardware chip, if possible, by examining its digital signature.
You can claim that the Sniffer and Monitor programs on the market can do this function. But these programs can examine as much as the operating system they are running gives them.
Therefore, a different system or operating system is required in this regard. Apart from this, "hardware antivirus" can be developed as an alternative to software antivirus and software cyber security systems.
Security software is usually installed on the operating system, the operating system kernel and, if necessary, the motherboard bios/uefi section. Alternatively, a "hardware antivirus" with a different motherboard and processor can be placed inside the existing computer case, regardless of the computer used.
The difference of this "hardware antivirus" from IDS, IPS and External Firewalls is that it can directly connect to the computer's memory, hard disk and network paths with a physical cable or implant, and physically control the computer system, ensuring the security of the computer regardless of the current operating system and motherboard.
This "hardware antivirus" can physically monitor the computer's input and output ports, stopping hard-to-detect BadUSB and NSA ANT tool attacks.

pci_disable_device unknown parameter error Anonymous 09/04/2022 (Sun) 00:30 [Preview] No.1811 del
GRUB boot commands works when I type pci=disable_acs_redir=pci:12D8:2308 in linux pci module.

When I type pci=pci_disable_device=pci:12D8:2308 to disable the hardware, it gives unknown parameter error.

what is the reason of this ??

Anonymous 09/04/2022 (Sun) 00:31 [Preview] No.1812 del
Anonymous 08/31/2022 (Wed) 09:25 No.1809

The pci_disable_device function is defined in the source file of the kernel pci module. Let the pci_disable_device function be a working parameter of the kernel pci module...

Antivirus and security software should use a second video card modulated for them. Anonymous 09/04/2022 (Sun) 00:32 [Preview] No.1813 del
Anonymous 09/02/2022 (Fri) 14:38 [Preview] No. 1810

Antivirus and security software should use a second video card modulated for them.

If security software uses a second video card that is modular for them, it does not overwhelm the existing system.

This makes the computer run faster.

Technology companies cannot be bought with money alone. Anonymous 08/31/2022 (Wed) 20:12 [Preview] No. 15121 [Reply] [Last 50 Posts]
Technology companies cannot be bought with money alone.

The main reason why Elon Musk could not buy Twitter is because technology companies cannot be bought with pure money power.

In order for you to actually buy technology companies, you need to deter other power elements related to the relevant technology company and secretly take control of the electronic, cybernetic and telemetric devices used by those companies beforehand.

Before purchasing, you should also secretly control the employees of the relevant technology company.

The real owner of Twitter is MOSSAD. The American Nationalist Forces behind Elon Musk are actually trying to buy Twitter from MOSSAD. Since the original owner of Twitter is MOSSAD, it is difficult to secretly take control of Twitter employees and the servers and other devices Twitter uses. Because of this difficulty, Elon Musk and the US Nationalist Forces behind him are prolonging the process with various excuses.

I am your subject Anonymous 08/31/2022 (Wed) 15:46 [Preview] No. 15120 [Reply] [Last 50 Posts]
i like you dam hackers!!!!!
maybe one day ill a>the haker one to bring the end

Endware Endwall 05/03/2016 (Tue) 08:54 [Preview] No. 32 [Reply] [Last 50 Posts]
Endware is a suite of programs geared towards internet privacy, security, and anonymity.

Endwall: endwall.sh is an iptables based firewall script designed to be implemented on any linux distribution shipped with iptables. endwall.sh is based on default drop policies, coupled with a novel strategy of passing packets on local host ports only for those enabled by the enduser. It comes with a variety of well used ports enabled with several additional port passing configurations available by uncommenting the script. It provides essential security to a new user.

Endsets: endsets.sh is a script that adds blacklisting and whitelisting functionality to endwall.sh. It depends on the program ipset. It is persistent on reboot if you enable ipset as a service. This is the recommended blacklisting tool for endwall if you are running a server or planning on opening up ports and services to the public and will require daily blacklisting of new incomming IPs.

Endlists: endlists.sh is a traditional text file list based blacklisting and whitelisting script. It has slow performance, and can't be updated on the fly. Good for <1000 ip subnets, very tedious and slow to run for more than that. Blocks the IPs by adding them as individual rules to the iptables ruleset. Works but not recommended for heavy duty on a server. May be useful for workstation use to block ip ranges if you are not opening up ports and services to public clients.

Endtools: endtools are a collection of scripts including alogz.sh, mlogz.sh, spamlogz.sh and iplookup.py. These scripts will help to service an enduser of endwall in adminstering endsets/endlists.

iplookup.py is a geoiplookup script written in python and requires python and pygeoip. It has simmilar functionality to maxmind's geoiplookup program and uses the maxmind *.dat files.

spamlogz.sh is a script that searches through log files to find flagged log entries flagged in endwall.sh, endsets.sh and endlists.sh.

alogz.sh is a daily log reading script designed to read the output of an apache http server's log output.

mlogz.sh is a daily log reading script designed to read the output of a postfix smtp server's log output.

Message too long. Click here to view full text.

Edited last time by Endwall on 02/25/2019 (Mon) 00:18.
280 posts omitted.

Endwall 06/25/2022 (Sat) 09:35:37 [Preview] No.1783 del
I have just done some work on endlists.sh, to finish making shell functions for all of the list methods. I then made a translation of endlists into nft, as endlists_nft.sh'





I use this script to do all of my /8 bans for regions I have no business with like Asia, Africa, India.
If there is a specific range you want blocked just drop it into blacklist.txt, and then run the file. I've left this section commented out. I should probably uncomment it so that it's available.

Next I'll work on adding verdict maps (vmaps) in nft to replace the functionality of ipset. The next product I'll try to translate is endsets.sh. Once that's done I'll be able to set up my clearnet server hosting using nftables as a replacement for iptables. I'll post an update when I have something to show.

Endwall 06/26/2022 (Sun) 09:08:57 [Preview] No.1784 del
I have completed translating endsets.sh into endsets_nft.sh using the native sets capability in nft. Tested working on Debian 11.

The files are located here:




Let me know if the files are working for you.

I also made some minor bug fixes to the following files:
endwall.sh, endwall_nft.sh, endlists.sh, endlists_nft.sh, endsets.sh, endsets_nft.sh. Located in the usual places.

Message too long. Click here to view full text.

Endwall 08/03/2022 (Wed) 06:34 [Preview] No.1793 del
I just ported endstream to macOS using a MacMini 2014 model with MacOS 12.5 Monterey. Using the Homebrew package manager you can install youtube-dl, curl, openssl, and mpv, and then the program will run. I've tested this port as working, and have placed it onto the github repository and onto the hidden service.


Endware Hidden Service

Now endstream is tested working on the following operating systems : { GNU/Linux, OpenBSD, Windows NT, MacOS }. I'm planning on going back and making winstream.bat into a powershell script so that it is fully compatible and can access all of the streams. Right now winstream.bat just uses fixed links and m3u8 playlists and can't access the Youtube live streams or other dynamic playlists. I'll have to learn more about Powershell first which might take a month or two. Its a side project.

My next task with endstream is to fix up the channels on the OpenBSD port and test it, I'll work on that in around two weeks when I have some free time.

Summary: I made a cross platform killer app, and gave it away for free on the internet...
Edited last time by Endwall on 09/18/2022 (Sun) 03:51.

Endwall 08/27/2022 (Sat) 13:03 [Preview] No.1807 del

I have completed and tested as working, a translation of endwall_wifi for PF. Tested working on a Toshiba Tecra with OpenBSD 7.1. I have also bug fixed the previous versions of the pf model, and added some new models for different use cases. The pf_wifi model is for locking to your internal LAN wifi. The pf_wifi_roam model is for allowing the wifi to connect to any network without re-running the firewall. The pf_roam model allows all interfaces to connect to any private LAN network for ethernet or wifi, basically you can plug in to anywhere or connect to any public wifi without re-running the firewall.

Obviously the more restricted the better,however these models might be useful for some applications, like using wifi at coffee shops etc. I have also made a roam version for nft which allows for the laptop to plug in anywhere. These are all available in the usual places:

endwall_nft_wifi.sh (wired ethernet is static but wifi is roaming)
endwall_nft_roam.sh (all interfaces allow connecting to any network)
endwall_pf.sh for wired ethernet (internal lan static connection)
endwall_pf_wifi.sh (1 wired and 1 wireless interface both static) (internal LAN static connection)

Message too long. Click here to view full text.

Endwall 08/27/2022 (Sat) 13:23 [Preview] No.1808 del
I have to make a nft model for static wireless + static wired connections for nft_wifi, and then rename the current nft_wifi model to nft_wifi_roam.

The use cases are as follows:

1) Wired only desktop computer connection with 1 interface for wired ethernet in your home connected to your LAN, which supplies DHCP with a static ipv4 address. -> (endwall.sh, endwall_nft.sh endwall_pf.sh)

2) You have a wired LAN router and a wireless LAN router both supplying static ipv4 DHCP addresses to your internal network. -> (endwall_wifi.sh, endwall_nft_wifi.sh, endwall_pf_wifi.sh).

3) You have a Laptop you use in your internal network, wired, and or wireless, but you sometimes take it with you to school, or to a coffee shop and require the wireless connection to allow roaming connections to randomly assigned DHCP addresses. Also useful for investigating the networks of neighborhood wifi networks in your vicinity . -> (endwall_nft_wifi_roam.sh, endwall_pf_wifi_roam.sh)

4) You have a laptop and you want to plug it in to ethernet anywhere you can get a DHCP address (school, the library, your friend's house), and also use wifi on any wireless network (school, library, coffee shop, friend's house) and both get a randomly assigned DHCP ipv4 address, without re-running the firewall. -> (endwall_nft_roam.sh, endwall_pf_roam.sh).

The security decreases as you go from 1)->2)->3)->4). Best practice is 1) no wifi, only wired connections on desktop computers, no wireless interfaces, and connections in your own LAN network using static ip assignment from the router with mac address binding. Next best is 2) only use your own wifi, in you internal network as well as wired on your own LAN with static IP. 3) You have static ethernet and WIFI LAN at home, but sometimes you bring the laptop to school and need to connect to a randomly assigned ipv4 address on their WIFI without re-running the firewall rules, or you are at home and want to connect to or investigate local neighborhood wifi networks without re-running the firewall. 4) You want to be able to plug in to any ethernet jack anywhere (school,library, friend's house), and use any coffee shop WIFI but only for allowed/selected ports.

I'll work on creating the nft_wifi_roam and nft_wifi models sometime next week. School is starting in 2 weeks, so I have to wrap these projects up before the session starts. I'll be too busy to do anything consistent once the semester starts up, other than some maintenance and bug fixes as I find them. I'll do what I can, on Fridays and Saturdays during school, but I'm going to be busy with school assignments and studying.

Let me know if these are working for you. Post bug reports, comments or requests below. Thanks.

(27.52 KB 450x337 165348249244.jpg)
Programming question Anonymous 06/08/2022 (Wed) 19:23 [Preview] No. 15059 [Reply] [Last 50 Posts]
Im trying to make a chat site so i need to know something
I am going to have a stacked div layout and the text will replace itself however i am not sure how to keep the text on screen even when refreshed im using html, java, css, and php (i, know garbage) and using both chrome and firefox in windows 10
1 post and 1 image omitted.

Anonymous 06/09/2022 (Thu) 15:50:10 [Preview] No.15061 del
You could use LocalStorage.


Or fetch it on refresh via PHP from the server.

Anonymous 06/11/2022 (Sat) 04:27:33 [Preview] No.15062 del
Maybe try using Flexbox for CSS?

Anonymous 08/21/2022 (Sun) 03:25 [Preview] No.15108 del
>while https://mitpress.mit.edu/sites/default/files/sicp/full-text/book/book.html is down.
What makes you think it's going to be back up?

Anonymous 08/21/2022 (Sun) 11:45 [Preview] No.15111 del
(242.53 KB 800x875 sicpanewhope.jpg)

(8.67 KB 735x386 deepwebs.jpeg)
Anonymous SSH chat Anonymous 08/13/2022 (Sat) 06:27 [Preview] No. 15097 [Reply] [Last 50 Posts]
Anyone interested to have old school hacker chat anonymously? And I really mean it, truly anonymously. Anonymous deep webs chat using SSH, that's right, no web / js soykaf.
ysdr3c3j7odl3p2zu5vdyaphf5x65l4hc3i2hmuy4vx4svibnxonvsqd on the onion network and port is 1337 protocol SSH as mentioned earlier.

Anonymous 08/13/2022 (Sat) 13:04 [Preview] No.15099 del
(15.79 KB 558x88 i did it.JPG)
Guys I did it! It took me a while to figure it out, but I am in. What is the prize?

Anonymous 08/14/2022 (Sun) 14:20 [Preview] No.15101 del
(78.38 KB 796x447 deeb-interwebs.jpg)
Way cool! Good job! Well, first of all, you can congratulate your self. I assume that at least 99.9% of people fail connecting, because they don't know. And that's what keeps the chat audience correct as well.

Come and hang around, when you feel like it. We hope there would be more users in future.

Was it you, whom mentioned about this thread in the chat? I guess it was.

It's ok to spread the word, among similarly minded people.

Anonymous 08/19/2022 (Fri) 10:53 [Preview] No.15106 del
(80.40 KB 256x256 haxor.png)
problem one: less than 1% know how to use something other than firefox in tor.

problem two: while ssh sure provides authentication between client and server, it does not provide authentication between user and user.
ultimately the ssh server provider will have full control over the data and could manip any time.
this alone will not make it more useful than other already existing web based solutions.

Anonymous 08/21/2022 (Sun) 08:27 [Preview] No.15109 del
Fully agreed. It's attack surface is different from traditional javascript in web-broser approach.

If you need secure services, it's always best to run your own. Also all chat rooms are considered to be at least semi public, so what's the problem. There's no expectation of secrecy, only anonymity.

You probably didn't check the motd.

Go and setup your own instance of ssh-chat, use Briar or
OnionShare to launch simple web-chat.

Anonymous 08/21/2022 (Sun) 11:35 [Preview] No.15110 del
What if the whole point is to keep absolute noobs out?
I did read about Tor from DailyMail!

What is Darkestdepth

Anonymous 08/14/2022 (Sun) 21:46 [Preview] No.15102 del

Anonymous 08/15/2022 (Mon) 13:10 [Preview] No.15103 del
Does anyone know the link to the Darkestdepth community? A community for accessing these private networks. Some feedback would be appreciated. Thank you.

Anonymous 08/16/2022 (Tue) 13:40 [Preview] No.15105 del
Testing to see if I'm banned because I got banned from /pol/

Take precautions against secret usb implants Anonymous 08/13/2022 (Sat) 08:16 [Preview] No. 15098 [Reply] [Last 50 Posts]
I am using Linux operating system.

My computer is not connected to the internet , I formatted it and changed the bios firmware and hard disk firmware. However, the program opens by itself, the mouse cursor moves by itself, and sometimes the system's default audio service is turned off.

When I examine it with the Wireshark program, an interrupt signal comes from the usb ports, even though there is no device plugged into the usb ports. The interrupt signal comes from linux's default idle hardware.
I have a hidden implant in my computer that looks like the NSA ANT COTTONMOUTH tool.
Wireshark logs https://easyupload.io/eqrfr6

This hidden usb implant can easily bypass all antivirus and security software by introducing itself as a hidden system process by overflowing the kernel, regardless of linux or windows operating system, during computer startup.

On computers that cannot exceed the kernel security, it introduces itself as a different hardware and takes over the control of the system via memory buffer overflow by overloading the interrupt. No antivirus and security software can detect this situation.

This hidden usb implant is not simple usb keyboard like ruber ducky and usb ninja. For this reason, do not recommend simple and useless scripts such as "usb guard". This implant is an advanced usb spying implant similar to NSA COTTONMOUTH.

My request from the linux community is to develop a security module for the linux operating system against hidden usb implants.

Exploit development with artificial intelligence Anonymous 08/11/2022 (Thu) 16:30 [Preview] No. 15096 [Reply] [Last 50 Posts]
Exploit development with artificial intelligence

Why don't hackers use artificial intelligence to develop exploits ?

It is quite easy to develop exploits with artificial intelligence.

They do not need to use their own computers for this. There are dozens of artificial intelligence services operating online.

A special artificial intelligence algorithm that you will prepare will scan all the vulnerabilities that have come up to date. By making comparisons between the vulnerabilities it scans, it determines the cause and source of the vulnerabilities in a way that a human cannot perceive.

Understands how to develop exploits against vulnerabilities by examining all exploits written.

That's what intelligence agencies do. This is how hackers should do it.


(31.39 KB 232x100 1571064253512.png)
Literally No Reason To Not Use Windows 10 Anonymous 11/14/2020 (Sat) 02:06 [Preview] No. 14460 [Reply] [Last 50 Posts]
And you're telling me you can't afford a $200 PC from the past 5 years that will run it seamlessly? Sell your 15 year old Thinkpads that can't even into AVX or non-fixed pipeline GPUs.
Have you anything to hide? No one cares about you. You aren't developing anything significant. You aren't a threat to the current ecosystem. You aren't a terrorist/spy/lone-wolf actor. FVEY has better places to spend its resources on. You're already being watched with facial recognition, Low-Earth orbit imagery satellites, and backbone-level deep-packet inspection.
You can disable the telemetry in settings. Go a step further too and get the Enterprise edition with minimal software preinstalled.
In the beginning? Sure, but now its quite stable, and you'll be hardpressed to come across any problems. Linux, on the other hand, presents you with hours of work, ranging from broken audio to missing files to a lack of hardware and application support.
You're paying for consistent updates and almost full support for any and every application in existence. The user experience and interface is only beaten by Mac OS from Apple, and is lightyears ahead of anything Linux could bring to the table.
You don't take advantage of FOSS. You've never looked into the software to determine how it works.
And Stallman is a foot-eating pedophile. Separate the art from the artist.
Windows is utilitarian with a focus on getting shit done. It won't waste your time with hundreds of customizable options and features. It just works. Imagine spending 10 minutes writing assembly code every time you wanted to use your microwave. The people who use windows only care about the applications inside of it, not stupid crap like sub-pixel rendering and kernel parameters.
Your elitism is nothing. "Normal" people are happy, fulfilled, and have their heads on straight. You on the other hand have spent countless hours behind a screen, posting on strictly anonymous websites, angry about the state of the world and how you're so much better than everyone else.
>FUCK YOU!1!!!1!

Message too long. Click here to view full text.

49 posts and 16 images omitted.

Anonymous 05/19/2022 (Thu) 02:23:43 [Preview] No.15056 del
I mean OP is most likely a troll but you're pretty much right

>There is no reason for me to switch to Windows.

Just use Wine to emulate anything windows related.

Anonymous 07/13/2022 (Wed) 16:43:53 [Preview] No.15074 del
Two years and counting. Jesus. That's some good fucking trolling.

My daily driver is a homebuilt desktop running Ubuntu. There is some very old, very specialized Windows software I use in a hobbyist capacity that just won't work with Wine, but it installs and runs perfectly in Windows XP in Virtualbox.

Also, I am surprised that no one has pointed out yet that Windows 10 is spyware. It takes screenshots several times an hour and phones home to Redmond with them as part of the "user telemetry" that's all enabled by default and which all "accidentally" gets turned back on after every Windows update.

Anonymous 08/06/2022 (Sat) 06:28:27 [Preview] No.15085 del
windows is fucking gay. I don't want any LGBT rainbow flag in my operating system

Anonymous 08/06/2022 (Sat) 23:33:12 [Preview] No.15086 del
Funny that Windows peaked with XP and has become shittier with every release since then. Windows 7 wasn't terrible, but updates backported much of the spy crap into it and now that it is gone, there's no reason to use Windowz. Windows 11 is even shittier than 10, why do people use this crap?

Anonymous 08/11/2022 (Thu) 15:25 [Preview] No.15095 del
Fear of change. Lack of executive function. Windows grants a sense of safety to the uninitiated. It is sad, but that's the way it is.

(862.37 KB 1024x768 bz.png)
BZFlag map format desired for ChaosEsque Anthology Anonymous 08/09/2022 (Tue) 03:50 [Preview] No. 15087 [Reply] [Last 50 Posts]
BZFlag map discussion. https://sourceforge.net/p/chaosesqueanthology/discussion/general/thread/e4d95485c9/
Years ago they, when I made BZFlag maps, deleted my textures because they didn't like my views: making my maps unplayable for everyone (all textures were hosted on bzflag webservers and only bzflag webservers).
I want to kill these people.
But what I would like more is for ChaosEsqueAnthology to parse the BZFlag map format.
2 posts and 2 images omitted.

Anonymous 08/09/2022 (Tue) 04:00 [Preview] No.15090 del
(352.52 KB 891x902 xrctfy_xcity.jpg)

Anonymous 08/09/2022 (Tue) 04:05 [Preview] No.15091 del
>Ur gonna havw to do better than this shit explanation. I cant even tell what it is youre asking. Write it out properly.

1) I like the BZFlag (2.0.3, 2005) map format:
*It is an ASCII format
*It is iterative
>(ie: you can "build" a grouping of meshes, then use that in other groupings of groups of meshes, and then put those anywhere at any rotation and scale)

2) Currently the engine can load Q1BSP and Q3BSP, and OBJ (an ascii format), and alot of other formats (IQM, ZYM, MD3, etc etc).

3) I recently add Wolfenstine:Enemy Territory BSP support aswell. So I've done work in this area

4) I feel burnt out though.

5) I made BZFlag Maps in the past: the format is simple but enjoyable to use

6) The engine allready contains a ASCII model format loader (OBJ).

Message too long. Click here to view full text.

Anonymous 08/09/2022 (Tue) 04:18 [Preview] No.15092 del
(58.79 KB 728x482 afg1630885959702.jpg)
>Sooo you made Loli porn maps in some shitty game?
I made 50 maps for Nexuiz/Xonotic. I've made 100s of models. I've done megabytes of QC code, and C code for the fork of the game.

I also outlined, asked for, and paid in cash for the following to be implemented in Nexuiz:
1) Cryptographic support
2) Warpzones
3) Fakelight

I also made the tuba model for nexuiz.

I've done megabytes of code for my version.

> This stinks of schizo autistic nonsense.
This is our website. Get off of it. Normie faggot.

> This is a basket weaving forum sir. I think you’re lost.

Message too long. Click here to view full text.

Anonymous 08/09/2022 (Tue) 17:16 [Preview] No.15093 del
(172.04 KB 767x432 curvacion.png)
Кфтвщь фтщт цфтештп ещ ыфн ерфе Ш дщму нщг Sorry, wrong keyboard. I love you very much, and you are doing the work that this world is valiantly bleeding for. Bless you.

Anonymous 08/09/2022 (Tue) 18:00 [Preview] No.15094 del
(67.06 KB 1125x1396 374.png)
its over for mipscels.

(88.81 KB 1280x720 Signal Chans.jpeg)
Privacy Anonymous 08/01/2022 (Mon) 08:30:26 [Preview] No. 15084 [Reply] [Last 50 Posts]
Signal is dead, they are glow niggers now.
They are closing some of their servers source. Time
to check out some alternatives https://be8.live
no install, no phone, no email, every network request
can be checked because it's a web app.

Join our group to discuss privacy https://be8.live?group=U2FsdGVkX1%2BqyAXTwF0xa7vX9WH9ns1%2BBaH5LSAFtq4%3D

Anonymous 08/27/2022 (Sat) 21:41 [Preview] No.15116 del
where's the source for this webapp nigger?

Internet Security General Anonymous 04/16/2016 (Sat) 07:56:30 [Preview] No. 4 [Reply] [Last 50 Posts]
Continuing from >>>/tech/597
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
93 posts and 4 images omitted.

IRC Endwall 12/30/2018 (Sun) 15:41:05 [Preview] No.1357 del
IRC Workflow
STEP 0) grab endsh.sh


requires torsocks and firejail

STEP 1) Install IRSSI

$ su
# torsocks -i pacman -S irssi
# exit

STEP 2) Modify config file
$ cd ~
$ cd .irssi
$ nano config

Message too long. Click here to view full text.

Edited last time by Endwall on 03/09/2019 (Sat) 06:52:35.

Endwall 12/31/2018 (Mon) 02:26:09 [Preview] No.1360 del

You can also set up proxying to in Hexchat. This works when connecting to the .onion addresses.

Settings->Preferences->Network-> Network Setup

Fill in the socks5 proxy information. Then Add the new server in the connection tab using the .onion address and port number. Works.

Anonymous 02/17/2019 (Sun) 03:15:44 [Preview] No.1369 del
Unless there is a discount for buying a vpn with bitcoin. It is not necessarily an anonymous transaction because you theoretically connect to your raw ip with the bitcoin purchased vpn.

baroque music is played exclusively on modern instruments ShawnWic 03/19/2019 (Tue) 06:22:59 [Preview] No.1382 del
No Spam 5 year ban
Edited last time by Endwall on 03/19/2019 (Tue) 07:15:15.

Anonymous 07/29/2022 (Fri) 10:40:37 [Preview] No.1792 del
What is the search engine that should we use?

Facebook develops exploits to hack into your computer! Anonymous 07/20/2022 (Wed) 10:54:54 [Preview] No. 15079 [Reply] [Last 50 Posts]
The usual products and services, Web trackers and phone apps are not enough for Facebook's infinite greed for spying and data mining. They will even develop exploits to hack into your computer for even more information gathering!


Anonymous 07/24/2022 (Sun) 15:14:34 [Preview] No.15081 del
Pretty much everything on FB is an exploit OP. No exceptions

Anonymous 07/29/2022 (Fri) 08:54:41 [Preview] No.15083 del
As usual he will making more exploitative algorithms

Meta Thread Endwall 07/12/2016 (Tue) 12:03:36 [Preview] No. 171 [Reply] [Last 50 Posts]
Post any comments, concerns, or requests for the board in this thread.
Edited last time by Endwall on 07/12/2016 (Tue) 12:15:00.
35 posts and 6 images omitted.

Anonymous 01/20/2022 (Thu) 03:29:04 [Preview] No.1767 del
endwall, how are you? If I remember, you were the guy on 8/tech/ that talked about being stalked in real life and surveillance etc. How did that turn out for you? I've always wondered because you drew a lot of attention (primarily negative attention) and I always hoped you'd get better

If you're the wrong person i'm sorry

Endwall 01/31/2022 (Mon) 06:26:14 [Preview] No.1769 del
Yeah I'm the person who posted on 8chan/tech. It turned out poorly. The situation does not appear to be improving. Socially and financially it appears terminal. My computer surveillance problems also remain largely unsolved, even after everything I've learned and implemented. I am under audio surveillance in my home,land line telephone surveillance, computer network surveillance, and man on the street surveillance. My bank accounts are under surveillance and I'm drowning in credit debt, with insufficient income to sustain a positive outcome. I am financially destitute and socially isolated. I can't find work beyond my low end part time job. Every attempt has been interfered with and blocked since around 2014.

Apparently I'm also a public celebrity. The level of the gang-stalking and harassment went full Truman show. It is cross border and probably international. The main instigators of the crime are actually my own family members who are all face rubbing hand waving shit heads. I don't rub my face or scratch my face in counted sequences to communicate with people. I learned about the basics of the issue in 2010 after a massive harassment campaign against me. The problem was going on as far back as 1997 after recollection, but I didn't recognize that it was organized until around 2009.

People I don't even know seem genuinely angry at me for reasons I don't even understand. They jump over themselves to lie about me, impersonate me on some public-private messaging service that I don't have access to, and insert themselves in my path in order to portray that I am either retarded, a moron, a homosexual, a stalker, a skirt chaser, a drunk, a drug abuser etc. All lies.

I'm mostly at home doing my online courses for college these days, so unless I go outside I don't have any issues except for with my mom. My mom stands in front of the door to my room when she gets home from work and does hand signs and gestures and sneers at me and repeats slogans like ("It ain't happening!", "Enough is Enough!" etc.), she's a fucking robot shit head. She's also become a MAGA, Q-ANON, conspiracy follower, and repeats lies to me about these things as if they are facts. I have stopped trying to debate with her about these things as it is a waste of time. Regarding my situation, my mom says platitudes to me like "Pray to God and it will get better!", "It will all work out, you just have to believe.", etc. She's actually part of the problem.

The number of people in society in North America who participate in face rubbing, hand sign waving, and robotic phrase repetition, ("Thank you so much", "This is it", "That is all"), command and control, is around 99% of the population. Democracy is an illusion, we live under totalitarian command and control organized by witch covens, cults, Freemasons, pimps, prostitutes, drug cartels, socialist communists, corporations and fascists. I'm not going to bother calling it freemasonry or some other fancy name. I'll call it what it is, Organized Crime and modern day Slavery. Military Government Totalitarian Slavery. I am 100% not involved in this group it's appendages or its training, but I can see its effects everywhere especially on my own life outcomes.

Due to the surveillance, harassment and public messaging network impersonation and negative public-private marketing against me ( where I assume people gain negative opinions about me), I expect to be financially troubled, and socially isolated for the remainder of my life. I've had around 14 years of continuous decline in my financial and social circumstances due to this campaign against me. We'll see how it goes, but it doesn't look good. My interest in computer network privacy, security and anonymity is directly related to my experiences being harassed and suppressed. I hope that answers your question.

Anonymous 07/12/2022 (Tue) 09:51:41 [Preview] No.1786 del
I know you won't listen to this but you are mentally ill and need to seek professional help. You are making up connections where they do not exist because you are paranoid. Please talk to a mental health professional anon.

Endwall 07/24/2022 (Sun) 00:37:34 [Preview] No.1790 del
No. None of the above. Organized crime is real. Government surveillance and harassment is real. Computer surveillance and harassment based on computer surveillance is real.

You need to seek an optometrist immediately. Please get help and talk to an optometrist so that you can see clearly.

Endwall 07/24/2022 (Sun) 01:19 [Preview] No.1791 del
An optometrist just will not do. Please seek professional help from an ophthalmologist. Ophthalmologists are medical doctors that will be able to help you with your vision and eye problems. They are also trained to perform eye surgery if required. This may help to correct your vision, and help you to see the world as it truly is.
Edited last time by Endwall on 09/18/2022 (Sun) 03:41.